kernel-5.14.0-611.38.1.el9_7
エラータID: AXSA:2026-320:20
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Linux kernel io_uring: Local privilege escalation, information disclosure, or denial of service via use-after-free (CVE-2025-38106)
* kernel: macvlan: fix possible UAF in macvlan_forward_source() (CVE-2026-23001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-38106
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() syzbot reports: BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60 Read of size 8 at addr ffff88810de2d2c8 by task a.out/304 CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary) Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: dump_stack_lvl+0x53/0x70 print_report+0xd0/0x670 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? getrusage+0x1109/0x1a60 kasan_report+0xce/0x100 ? getrusage+0x1109/0x1a60 getrusage+0x1109/0x1a60 ? __pfx_getrusage+0x10/0x10 __io_uring_show_fdinfo+0x9fe/0x1790 ? ksys_read+0xf7/0x1c0 ? do_syscall_64+0xa4/0x260 ? vsnprintf+0x591/0x1100 ? __pfx___io_uring_show_fdinfo+0x10/0x10 ? __pfx_vsnprintf+0x10/0x10 ? mutex_trylock+0xcf/0x130 ? __pfx_mutex_trylock+0x10/0x10 ? __pfx_show_fd_locks+0x10/0x10 ? io_uring_show_fdinfo+0x57/0x80 io_uring_show_fdinfo+0x57/0x80 seq_show+0x38c/0x690 seq_read_iter+0x3f7/0x1180 ? inode_set_ctime_current+0x160/0x4b0 seq_read+0x271/0x3e0 ? __pfx_seq_read+0x10/0x10 ? __pfx__raw_spin_lock+0x10/0x10 ? __mark_inode_dirty+0x402/0x810 ? selinux_file_permission+0x368/0x500 ? file_update_time+0x10f/0x160 vfs_read+0x177/0xa40 ? __pfx___handle_mm_fault+0x10/0x10 ? __pfx_vfs_read+0x10/0x10 ? mutex_lock+0x81/0xe0 ? __pfx_mutex_lock+0x10/0x10 ? fdget_pos+0x24d/0x4b0 ksys_read+0xf7/0x1c0 ? __pfx_ksys_read+0x10/0x10 ? do_user_addr_fault+0x43b/0x9c0 do_syscall_64+0xa4/0x260 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0f74170fc9 Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 8 RSP: 002b:00007fffece049e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f74170fc9 RDX: 0000000000001000 RSI: 00007fffece049f0 RDI: 0000000000000004 RBP: 00007fffece05ad0 R08: 0000000000000000 R09: 00007fffece04d90 R10: 0000000000000000 R11: 0000000000000206 R12: 00005651720a1100 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Allocated by task 298: kasan_save_stack+0x33/0x60 kasan_save_track+0x14/0x30 __kasan_slab_alloc+0x6e/0x70 kmem_cache_alloc_node_noprof+0xe8/0x330 copy_process+0x376/0x5e00 create_io_thread+0xab/0xf0 io_sq_offload_create+0x9ed/0xf20 io_uring_setup+0x12b0/0x1cc0 do_syscall_64+0xa4/0x260 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 22: kasan_save_stack+0x33/0x60 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x60 __kasan_slab_free+0x37/0x50 kmem_cache_free+0xc4/0x360 rcu_core+0x5ff/0x19f0 handle_softirqs+0x18c/0x530 run_ksoftirqd+0x20/0x30 smpboot_thread_fn+0x287/0x6c0 kthread+0x30d/0x630 ret_from_fork+0xef/0x1a0 ret_from_fork_asm+0x1a/0x30 Last potentially related work creation: kasan_save_stack+0x33/0x60 kasan_record_aux_stack+0x8c/0xa0 __call_rcu_common.constprop.0+0x68/0x940 __schedule+0xff2/0x2930 __cond_resched+0x4c/0x80 mutex_lock+0x5c/0xe0 io_uring_del_tctx_node+0xe1/0x2b0 io_uring_clean_tctx+0xb7/0x160 io_uring_cancel_generic+0x34e/0x760 do_exit+0x240/0x2350 do_group_exit+0xab/0x220 __x64_sys_exit_group+0x39/0x40 x64_sys_call+0x1243/0x1840 do_syscall_64+0xa4/0x260 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88810de2cb00 which belongs to the cache task_struct of size 3712 The buggy address is located 1992 bytes inside of freed 3712-byte region [ffff88810de2cb00, ffff88810de2d980) which is caused by the task_struct pointed to by sq->thread being released while it is being used in the function __io_uring_show_fdinfo(). Holding ctx->uring_lock does not prevent ehre relase or exit of sq->thread. Fix this by assigning and looking up ->thread under RCU, and grabbing a reference to the task_struct. This e ---truncated---
CVE-2026-23001
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
Update packages.
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() syzbot reports: BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60 Read of size 8 at addr ffff88810de2d2c8 by task a.out/304 CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary) Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
N/A
SRPMS
- kernel-5.14.0-611.38.1.el9_7.src.rpm
MD5: 70ffbfcbee116854dd260fc7a0a23a5b
SHA-256: e11d9878ece7044178fac0c793b6304c6fc6a6149681950523431a9318e9ef01
Size: 144.03 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 6ac38fee5da3bd571de64e7e61fbfd0e
SHA-256: 4e4ab89d2444805ecf8568bb2015100a3160c47e5918d7d9b7a495967dfd6075
Size: 1.11 MB - kernel-abi-stablelists-5.14.0-611.38.1.el9_7.noarch.rpm
MD5: 1620679a178a5d95d2b93818396e7d1c
SHA-256: a3fb8626badd50f6027db71d1c95df1234f1e6659d95ef80e897921b5c1213b6
Size: 1.14 MB - kernel-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 36a190f246fd470cb08d95d3f95d8691
SHA-256: ba146bd7b4ab16879a9d5143d9a21f6d2256a752c86fd464aefa143094b53605
Size: 17.39 MB - kernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: a4e115dbc3c85d7dec5038f35029519d
SHA-256: 09c62f0927d229a9ff15de3aa0bc6c7a7640ed1e7007f457254da4da84c3860d
Size: 8.05 MB - kernel-debug-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 8d1d570f5a4c540021aa9740f3042943
SHA-256: e8067a07e154ee9c8fa92a860d74a17952ca761c4f897b9037acbc3ed4f6e0ba
Size: 1.11 MB - kernel-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 368269b8b7418128cb915592390d9a14
SHA-256: ed0375259800d1b68337d3cc5ed154668b4389e29ee08a7ee657e97e36b006d7
Size: 30.98 MB - kernel-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 1582dc0431f101f0444399168fd17617
SHA-256: 062cc3eab75b114b8048ab6aa9d0fa71deeb59ddd2c3ce04de06221550f846cd
Size: 21.30 MB - kernel-debug-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 552655be7c0a7978c7833134f88a2779
SHA-256: 12bef51568c7cc68c02fac5649701ab811d959db077b92ab2c8772759c660723
Size: 1.11 MB - kernel-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: b9cb04a8c29bf0d77061c665f879ece7
SHA-256: 7d02fff3e6730d4a857a3b1409cb00973ff6a2083dcc0611103d721612b88d26
Size: 69.36 MB - kernel-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 2e58874cf2730f0ccdafae3386f3f86e
SHA-256: b10787a05d18e130ee58c6269ea268a9497b9a3f156852ad55ec90583b4b4457
Size: 49.55 MB - kernel-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 8f6d98ecbab30f25bcc07ed24768fb5c
SHA-256: c430262f6807d809e18b5916b18302d91a233cd52a61b4b40f023dc7e89f5662
Size: 1.92 MB - kernel-debug-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: c43ba94cf78d8994536ebeaa40dcd87f
SHA-256: 018cd9ddb5e158c7ebca25a1fa454abecbe497660281eed2917730eb46d5edcc
Size: 85.85 MB - kernel-devel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 7182b240dab23427ccd10796040cbc07
SHA-256: 4eaa38b636bd2b476cad45588451c113192c07f6ae1444ec7ca9cf8b140e83e0
Size: 21.13 MB - kernel-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 4cf3a9daafc7a85f3c06b37941f9c144
SHA-256: 20ca631cb91b5453ea4b0ea4741d44e29b6d95da4c3d090876323caff634a38a
Size: 1.11 MB - kernel-doc-5.14.0-611.38.1.el9_7.noarch.rpm
MD5: 8dcbde60dd5f4cdcda43051bfba3d3dd
SHA-256: 8b2dcfa7ad6fdd4f01ff96bd38c0b22e0cf87acc712aa6198deeac936b2c2513
Size: 38.86 MB - kernel-headers-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 742d338cc710a6c3845b5621fa89597e
SHA-256: c2637510e421a6d49f2e776a68ba3d68881035b874cda24aa2fabbb5491747be
Size: 2.87 MB - kernel-modules-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 8330a14ae8c892e83cc1600c70626a9a
SHA-256: 52b46f5757d107c96a6415469e50da70f5fc8aaacf0f7e145ed0e7132732b428
Size: 39.78 MB - kernel-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 17ee373365780e960a6385423e36566a
SHA-256: ab3f2118297b13a194e4e01206b559718db2547ab8857c22734f016624028c7f
Size: 30.98 MB - kernel-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 1644af3574e48a72d1381b5eafaed6ac
SHA-256: 0075469ef4942f4815c6237d490702d16229a134054a936ad382c6809e9c7555
Size: 1.55 MB - kernel-rt-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: d11434759940da24884cccde20b14b63
SHA-256: 057f82e51a27b3741b7509797f795a7174575b28544b33220fbb8f8cd32c577f
Size: 1.11 MB - kernel-rt-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 7996494cdb7f611b7eaf9e570af1beaf
SHA-256: f72ab43b99ffa50e812c2c5d2339a0a3600cd674a424cb8a33b1c4a96aacdd8b
Size: 17.31 MB - kernel-rt-debug-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 0cc7a1009212b03dae7859b4ac3e2eef
SHA-256: 08752e228a36761fe8dcbac53b8eb49728d6d0fc358f26d8e346760602d1faa0
Size: 1.11 MB - kernel-rt-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: b180ba7353ba6651920c665136a76dcb
SHA-256: 7014982255b6581c26d24ddfcd0fb9b9ace8a90849c7c2550c077052331c33d5
Size: 18.73 MB - kernel-rt-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 59585a738446cef1cbba20fc7fa791bd
SHA-256: e695db81d127e9c5e84b746cc9ae1a6910c74459134d21dade4da6cc07cc49dc
Size: 21.25 MB - kernel-rt-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: a9eba3f96cf801232ca65d092dba7c97
SHA-256: fbafdd420a28aefb0fce4b8bb8626d601197f3c9a412124642c16aa494bcdd77
Size: 41.34 MB - kernel-rt-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: bcbaa4203d4340e6dd5a319926ea2263
SHA-256: d736d316d84c3b4cb3d9afe0cf49662c435f7f8eadf966c07c573e4574f23784
Size: 32.15 MB - kernel-rt-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: eaaf749d0c9f5e530f2cb6f4a52443c8
SHA-256: ec37f557a3357a271f76198e727227c79c9a9189a4b49495975d501ac2310033
Size: 1.58 MB - kernel-rt-devel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 6eeee161308d11662c47a20e9b515628
SHA-256: aaa0de7c0fb9598013f52b0835e95f993b227bcaac38e7bcd2c7c570b0ea5640
Size: 21.12 MB - kernel-rt-modules-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 9f3e4f0e805779ed0e3eac557e1b92ec
SHA-256: 92b8e1c90c8995a7272e9f8b474fdef02662f50aef23ca4ba1c016e81fcb3c52
Size: 39.83 MB - kernel-rt-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 00e1db81884ec60e04de1b416e7d62a8
SHA-256: 74e86e25fbb4ea69879d2b83c38d2137177b0ac534fab05a92728bfedc0887a7
Size: 31.06 MB - kernel-rt-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 3fc9464b8c34ff14ae535e309b452b11
SHA-256: 9c29394db8ffd7fe4174300e2739ef2d63378ac9ffd0f4a58d871736d6dcf321
Size: 1.55 MB - kernel-tools-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: e68c0b0c3cce1fba42fa9b97f6fc4aee
SHA-256: 7154d95fd75301f7a0cbaeb1f3c427e8791cb8f8fca8917096d0ff695b1283a7
Size: 1.40 MB - kernel-tools-libs-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 03e22119a2d314abc4cf0827097c3399
SHA-256: 69723396610a5edc1cf0154747ac81fbc87d89dfc53fdd1eb40fefbd3439b2cf
Size: 1.12 MB - kernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: f933099e1fedb2edaab2149d04343012
SHA-256: 82cdedb29c5d244bad237c668fb9800e21266ca38aa890ed9e35fd99a1098b59
Size: 1.11 MB - kernel-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: a258b2ad05a2a9b38e941cee1ea9b189
SHA-256: b016c695ac9c292b552208c14d19909a154b31dbd8b921fe9566aeed4de8eead
Size: 63.98 MB - kernel-uki-virt-addons-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 727073f3c4b3489179fb88cfe0a29917
SHA-256: 27b5056cbf7e2c838fcd95ecb14ded49a084c43899acc4b75dfaaa0b166636f6
Size: 1.13 MB - libperf-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 682f1cc8c0b87ef271b798cadcb7f25a
SHA-256: 8ab44cf3d21724c2958ae94e13c98159b3643128ea0d11b48ea1d6301e65c853
Size: 1.13 MB - perf-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 192b5056a5b8657000e9a707c9a25a2f
SHA-256: 85132b5ff5d2952cf1c799f6834b906fdeefca85f87c7e44c1affbdefdecce06
Size: 3.37 MB - python3-perf-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: a77ceb3074866da60d8a593a9beb9823
SHA-256: 303248c297b390d81c44a3c07e779ba7a3b718549754349f333e9c463a1646fc
Size: 2.54 MB - rtla-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: ced00c98986c514a978d74b8e6d9dc37
SHA-256: e3f947b27076cd9118dbf96fce4ddd9b0132ac4fa7ba355f5cd22577b9e59bb3
Size: 1.18 MB - rv-5.14.0-611.38.1.el9_7.x86_64.rpm
MD5: 5ee16c32a538bbc242ea537f1ba83e22
SHA-256: e96bde778b060ffce34bc19262dd3b15ddc17d9d9c1c3d1af9d6c4ecca1066b1
Size: 1.13 MB